International Journal of Fuzzy Logic and Intelligent Systems 2023; 23(3): 336-352
Published online September 25, 2023
https://doi.org/10.5391/IJFIS.2023.23.3.336
© The Korean Institute of Intelligent Systems
Sultan H. Almotiri1 , Mohd Nadeem2 , Mohammed A. Al Ghamdi1 , and Raees Ahmad Khan3
1Department of Computer Science, Umm Al-Qura University, Makkah City, Saudi Arabia
2School of Computer Application, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India
3Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
Correspondence to :
Mohd Nadeem (mohd.nadeem1155@gmail.com)
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.
Keywords: Quantum computing, Quantum software security, Healthcare software security, Fuzzy AHP, Fuzzy TOPSIS
The American law firm BakerHostetler released a report called “Information Security Occurrence Response Report” in 2022. It mentions that both the number and severity of security incidents are on the rise [1]. After analyzing more than 1,270 events, BakerHostetler discovered that 24% of safety incidents were caused by phishing, and 56% of them were caused by network outages. The remaining 20% of assaults were attributed to accidental disclosure, system errors, and stolen/misplaced data or equipment. Thirty-seven percent of the analyzed occurrences involved ransomware, an increase of 10% over the previous year. This has a wide range of effects, including new and higher expectations for younger medical professionals, new and higher standards for patient convenience and simplicity of participation with their healthcare organization, and the protection of their data. Another important consequence of this new world is the importance of healthcare data security.
According to the Software Advice’s 2022 Healthcare Data Security Survey, 36% of the healthcare companies in the United States have experienced a data breach (Figure 1). In addition, phishing was widespread. Phishing attacks were the primary cause of break-notice obligations, increasing from 43% in 2020 to 60% in 2021 [2–4]. According to many high-profile production network attacks involving outsiders in 2020, the research also noted that merchant-caused incidents were on the rise. The average number of days required to spot an attack was 47 days, which was significantly lower than the 2020 average (92 days). This was partially attributable to the acceptance of more advanced security tools. Overall, it required zero days, down from three days in 2019, and was identical to that of the previous year. The interval between the control and measurable examinations was also shortened; in 2021, it was 30 days, as opposed to 36 days in 2020. At that moment, more than 18,000 solar wind customers had installed the Sunburst update, allowing the remote access Trojans to infect all their client companies and frameworks. The US state, banking, and health departments were among the notable casualties of this attack [5].
Additionally, reports have shown that this malware affects privately held companies, such as FireEye, Intel, Cisco, and Microsoft. As acknowledged by Microsoft, it was difficult to estimate the number of afflicted associations and organizations because of the update’s ability to spread to numerous client devices. Currently, there is no clear indication as to who was responsible for the assault. State-approved programmers in Russia and China have drawn criticism, but the lack of thorough verification encourages further investigation. Software security includes procedures in security architecture to aid maintenance. This indicates that a piece of software is subjected to software security testing before being put on the market to determine its resistance to harmful assaults. Software security aims to build secure software from the ground up without the need for extra security layers. The next stage involves providing users with instructions on how to use the software correctly to fend off attacks. Software security is essential because malware attacks can compromise the availability, validity, and integrity of any software. If programmers consider this earlier rather than later in the development process, the damage can be stopped before it starts [6].
Network security refers to the security between devices connected to the same network. Security of both hardware and software is essential in this situation. To secure a network, businesses search for measures to prevent harmful usage [7]. The devices used in this scenario are the subject of endpoint security. Computers, cell phones, tablets, and other devices are secure in terms of both software and hardware to keep out unauthorized users. User control, software security, and other encryption techniques are widely used for this [8]. Cybersecurity, usually referred to as internet security, is concerned with the usage and transfer of information. Several layers of encryption and authentication are often employed to prevent cybersecurity attacks because information is intercepted during them [9]. It is necessary to protect data flows and devices connected to the same network [10].
The main goal of this study is based on the quantum algorithm as an alternative for evaluating healthcare software security (HSS). The evaluations assessed the security factors of software in the healthcare domain. Software security is necessary for the evolution of quantum computers. A team of researchers (Google and IBM) developed a quantum processor that can easily break the present security mechanisms [9, 11]. The estimation is required for the upgrade mechanism of the software.
Section 2 points out the researcher’s contribution in the area of HSS individually; Section 3 elaborates on the HSS factors and quantum algorithm that may be used for security purposes; Section 4 explains the estimation approach of soft computing, i.e., fuzzy analytic hierarchy process (F-AHP) and fuzzy techniques for order of preference by similarity to an ideal solution (F-TOPSIS); Section 5 compares the evaluation procedure with the classical one; and Section 6 determines the sensitivity analysis of the estimation of HSS. Finally, Section 7 explains the outcomes of the analysis and details the application of the evaluation concerning the future aspects of the results.
In healthcare software (HS) development, security is an essential part of IT-based organizations. The healthcare sector has witnessed significant advancements over the last decade. The evolution of artificial intelligence keeps the healthcare sector more vulnerable. After the development of quantum computers, software security has been at risk in the classical phase. Detailed studies on software security are discussed in this section of the literature review.
Bhavin et al. [12] mentioned that the healthcare sector has the right to know how and why data are being used under the general data protection rule. However, because the Internet is an open channel through which healthcare data move, it is possible for bad things to happen, such as sensitive data being stolen or stored data being changed. Privacy and security are challenging to preserve in traditional healthcare systems. The quantum computing (QC) examines several security architectures for protecting electronic health records and a common encryption scheme based on these facts. Quantum-enabled security algorithms protect data against quantum attacks on the traditional encryption method.
Sanavio et al. [13] stated that QC can perform tasks that were previously unimaginable because it uses quantum bits and the quantum properties of subatomic particles, such as superposition, entanglement, and interference, as well as other fundamentally different ways to process information than traditional computing systems. QC systems promise much faster processing; however, research and development are still in the early stages. QC has not been studied much in important fields such as healthcare, even though it could lead to important advances like faster DNA sequencing, drug development, and other processes that require considerable computing power. In this study, we look at how QC could be used in healthcare systems. QC has the potential to change the way healthcare systems work by making it possible to do complicated calculations faster [14] and identify security weaknesses of traditional cryptography systems. We examine the difficulties hindering the use of QC systems in healthcare and the causes that have contributed to them.
Davids et al. [15] mentioned conceptual extensions of many body systems and quantum computations that have yet to realize their full potential, including quantum clinical medicine and quantum surgery, and discussed QC principles. Advances in precise nanoengineering and new mathematical formalisms for algorithmic design, including quantum mechanics, category theory, quantum algebraic geometry, and others, are laying the groundwork for this intriguing area of medical and future surgical science. The authors predicted that QC would lead to improvements in healthcare, surgery, and medicine.
Malviya and Sundram [16] mentioned that the healthcare sector provides assistance to people fighting against illnesses and disorders. Medical practitioners provide state-of-the-art therapies and drugs to manage illness-related side effects. Patients want a modern, tailored healthcare system that can keep pace with their fast-paced lives. A QC system is a solution to the need for low latency and low energy consumption in real-time health data collection and analysis. QC is a cutting-edge computing technology based on the interesting phenomena of quantum physics and quantum mechanics. In this instance, physics, mathematics, information theory, and computer science are well integrated. It is feasible to attain speeds exponentially faster than those of conventional computers, have a larger processing capacity, consume less energy, and more by changing the behavior of microscopic particles like atoms, electrons, photons, and so on.
QC is growing rapidly, not only because its hardware is faster and can run complicated algorithms more quickly but also because it has a new tool for analyzing data that can solve problems with standard machine learning [17]. It uses ideas from quantum mechanics, such as superposition and entanglement, which have long been used in physics to perform computing tasks that are faster and possibly more complex than those that can be performed with traditional algorithms.
Clinical care and medical research were the first places where computers were used in a new manner. QC has the potential to make computers more powerful and initiate a new era in computer technology. A new era of computing has begun. The potential of QC in enhancing population health, imaging, diagnosis, and treatment is currently based solely on experiments. The use of quantum computers in routine medical and scientific applications has yet to be realized. Many machine learning and artificial intelligence algorithms have the potential to leverage QC to produce findings instantly. Researchers will continue to be the only ones who can use QC until it reaches this level of accessibility [18].
Perumal and Nadar [19] showed and explained that healthcare systems are inherently heterogeneous because each device has a different operating system, platform, and architecture. This variability affects communication latency and security issues. An optimized quantum approach is used to manage keys with the least overhead and decrease threats while simultaneously enhancing healthcare information security. The quantum channel was also used to simulate communication with the key authority. A dedicated quantum channel is used to distribute the generated key, which further improves security by lowering leakage, transmission errors, and eavesdropping. The healthcare user group and the content server communicate with the key server via a quantum channel that sends photons. Numerical data support key generation, optimization, and quantum distribution strategies. To encrypt and decrypt healthcare content, the security of patient data is improved, and quantum simulation estimates in healthcare networks decreased by 90% [19]. In the online healthcare world, the process of sending information between the main and each branch has always been important. In recent years, security checks for network technologies have become increasingly common. A secure and high-capacity information transfer protocol for healthcare cyber services is being developed using quantum algorithms and quantum expansion technology. This innovative technique simultaneously embeds the secret data in three layers and encrypts it. Finally, a quantum channel was used to send extremely secure secret information in the form of a quantum state. This new protocol provides a revolutionary steganography method for quantum images. In essence, the fact that the steganography protocol cannot be observed means that it has a higher level of security that may stop several attacks and make the process of sending information safer [20, 21].
Developers choose QC algorithms that enable security for future advancements in computing [11]. QA1–QA10 are alternatives for estimating HSS. The details of QA are discussed below:
In
The innovative
Multicriteria decision analyses are based on a hierarchy of factors and their dependence on alternatives. Quantitative analyses of the HSS estimation evaluate the weights and ranks of the factors and alternatives. The artificial approaches of the fuzzified AHP estimate the weights of the factors associated with the HSS, as shown in Figure 2. The artificial approach of the fuzzy TOPSIS evaluates the ranks of the associated alternatives.
We used the hybrid neural approach of F-AHP and F-TOPSIS as soft computing tools for making decisions based on multiple criteria. The FAHP looks at the importance of each factor, while the F-TOPSIS looks at the importance of each alternative [6]. This strategy assesses the variables that affect the perspective of the HSS. The initial weighted values are based on a thorough assessment of the literature. We chose to fulfill our goals using a multi-model dynamic regular technique to assess the aspects associated with HSS. The F-AHP and F-TOPSIS hybrid approaches were used to assess and survey the component weights. F-TOPSIS provides the precise position of the variable relative to the other alternatives. The going with theory fuzzy system was used to accurately assess the items. We chose a soft-computing method to evaluate these factors quantitatively. One of the elements of the F-AHP and F-TOPSIS approaches is item evaluation. To improve the comprehension of the problems and the accuracy of the resources, numerous methodologies and assessment frameworks have been published in hard copies. However, F-AHP is the most effective multi-rule method for calculating the effect of an item’s health. However, F-AHP encounters certain difficulties [24]. To manage crossbreed F-AHP and F-TOPSIS, we merged the F-TOPSIS with a creative management strategy [39]. This unique approach makes it easier to assess the impact factor and its alternatives accurately.
These techniques determine the unmistakable productive assurance of problems involving influencing HSS using the F-AHP method.
It depends on the attributes and number of options that are most closely related to those attributes. The fuzzy numbers used to compare the F-AHP show how they are evaluated and ranked philologically [9]. Table 1 displays the corresponding fuzzy numbers for the comparison of the philological rankings. Figure 3 shows a fuzzy comparison measures (FCM) representation.
Subsequently, the F-AHP system assessed each substance submitted by the examiner. Subsequent improvements selected FCM from the hierarchical architecture. One metric assesses how a component and its selection affect various elective principles. Each variable had a pairwise relationship that acknowledged its importance to the whole (Figure 4). The following iteration of the F-AHP modifies the numerical value of the etymological phrases using fuzzy correlation measurements [23]. The heaviness of the pieces was determined using the FAHP technique. These approaches are described in detail as follows:
As illustrated in Figure 4, choose or consider “
where
The m alternative in geometrical arrangement with m points and n-dimensional area The TOPSIS methodology is used in multi-criteria decision selection for ranking. The core of the TOPSIS approach is the notion of the enduring and most remote distance from the positive ideal solution and the negative ideal solution for the most favorable and minimal ideal solution, respectively [40]. The TOPSIS approach significantly simplifies the process of assigning the appropriate position to the alternative and the factor concerning the criterion. To create uniformity in a fuzzy environment and indicate the importance of the criteria, TOPSIS assigns fuzzy numbers based on preference.
• Create a fuzzy decision matrix.
• Normalize the fuzzy decision matrix.
• Create a quantified fuzzy normalized decision matrix.
• Evaluate and define FPIS, FNIS.
• Evaluate the closeness coefficient.
The fuzzy decision matrix is created using
Here,
Calculate the normalization of the fuzzy decision matrix using
The intended highest level
where
The components
By assessing and defining fuzzy positive ideal solution (FPIS) and fuzzy negative ideal solution (FNIS), the FPIS A+ (aspiration levels) and the FNIS A are shown in
Applying the area compensation approach, as shown in
The degree of relative gaps is represented by the closeness coefficient (
Here,
– is defined as the fuzzy gap degree in the
F-AHP is a hybrid soft-computing method that combines F-AHP and F-TOPSIS. This gives the weight of each influencing factor from P1 to P8. From QA1 to QA10, the F-TOPSIS technique ranked the choices. The majority of the time, subjective assessment is adequate for determining how the HSS factors will affect things. It is challenging to quantitatively evaluate HSS. Although a property of order at one level affects one or more qualities at a more significant level, the effects are not the same, as shown in Figure 4. Things might vary. To evaluate this, we converted the aggregated qualities into chains of importance.
Table 2 lists the different security risks P1 to P8, and their FCM weights and BNP are listed in Table 3
Tables 5
The F-TOPSIS equation in Table 8 indicates the degree of closeness. The various HSS properties were comparable. According to expert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition pert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition. Figure 5 shows the degree of proximity.
The same data, results, and output differ when different methodologies are applied. This guaranteed the effectiveness and dependability of the method [22]. In this study, we evaluated the efficacy and precision of the outcome using the F-AHPTOPSIS approach. AHP-TOPSIS uses the same data collection and estimation techniques as fuzzy AHP-TOPSIS; however, no fuzzifications are applied [39]. As a result, for the classic AHP-TOPSIS, the values are taken in their real number form. The distinction between the conventional and fuzzy AHP-TOPSIS results is presented in Table 8 and Figure 6. The results of the F-AHPTOPSIS method and those from the traditional AHPTOPSIS approach had a Pearson correlation coefficient of 0.999176. The F-AHP and F-TOPSIS procedures and methods were superior to the second technique in terms of effectiveness.
Using the sensitivity analyses [41, 42] shown in Table 9, the results were checked as each variable was changed. Sensitivity analysis was performed based on the variables’ weights [43]. Several experiments for each factor with the same number of participants were conducted in our HSS-based investigation to confirm the sensitivity analyses [44, 45]. The satisfaction level (CC-i) was computed using the F-AHPTOSIS method by calculating the weight of each factor (P1–P8 as a constant). The results of the sensitivity analyses are presented in Table 9. The first rows of Table 9 and Figure 7 display the initial weights, whereas Figure 6 displays the first collection of data. According to the initial weights and outcomes, Factor-8 (P1–P8) had a high level of satisfaction (CC-i). Ten experiments were conducted, from QA1 to QA10. The findings of eight studies showed that Factor-8 (P1–P8) still had a high degree of pleasure (CC-i). P2 was also a factor in each experiment and was assigned the least weight. The different correlations between the data show that alternative ratings are weight dependent [46, 47].
Software is becoming increasingly complicated and important in everyday life. However, the main reason why there are so many more data breaches is that there is insufficient security infrastructure that is easy to use. Dominion National, an insurance company, found a nine-year attack on its servers that could have put the personal information of 2.96 million patients at risk. These infractions have led to the theft or exposure of more than 189 million healthcare documents. Therefore, there is an urgent need to evaluate the security of software products using high-quality methods built in. The goal of this investigation was to calculate HSS. To this end, a case study was conducted on six hospital management software companies. To fulfill its goals, this study used ten alternatives in addition to eight security attributes at level I, namely QA1 to QA10, which include QA1, QA2, QA3, QA4, QA5, QA6, QA7, QA8, QA9, and QA10.
The results of this empirical investigation will help experts create software with the correct level of security. Several security models each estimate security in various ways. Nevertheless, few security model options are available for a single product. Furthermore, only a small percentage employ TOPSIS, F-AHP, or other multi-criteria decision-making techniques. The authors used the unified fuzzy AHP-TOPSIS of the MCDM. Fuzzy logic is particularly adept at resolving ambiguous and imprecise information in decision-making challenges; this property of the AHP properly portrays real-world problems and yields better solutions. In addition, TOPSIS supports the selection of the best option from the given options by effectively categorizing alternatives. To attain the best outcomes compared to other MCDM approaches, this study used the combined fuzzy AHP-TOPSIS. According to the findings of this study, the QA6 program provided the highest level of security and user satisfaction among the ten alternatives. The highlights of our study are listed below along with a summary of the results.
Pros: Secure HSS apps can assist programmers and designers in producing superior programs that can completely please users.
• With the help of the F-AHP-derived results of this study, practitioners can group qualities into groups and choose security design options when making software products.
• This will provide software products with long-lasting security.
• Security is a significant problem in the quantum world that is currently unaddressed. This study will serve as the gold standard for app developers to gain a thorough understanding of security architecture.
Changing validity:
• Finding and choosing attributes for security assessment is neither ideal nor definitive. The number of attributes or specific sets of qualities may have affected the results. Although MCDM techniques may be more suitable for MCDM issues, the combined fuzzy AHP-TOPSIS is a useful tool for security evaluations.
• In conclusion, this study employed an integrated fuzzy AHP-TOPSIS methodology to assess HSS security.
The powerful fuzzy AHP-TOPSIS Integrated method can be used to evaluate any MCDM problem with numerous parts and options, such as security assessments. Using a quantum computer, we calculated the security factors and estimated the HSS. The necessary weight variables were also assessed. The most recent evaluation of options using TOPSIS was tested for each of the open security options QA1–QA10 (QA6
No potential conflict of interest relevant to this article was reported.
Comparison of quantum algorithm as an alternative with the fuzzified and non-fuzzified approach.
Table 1. Fuzzy comparison measures (FCM).
Linguistic terms | FCM |
---|---|
Equal | (1, 1, 1) |
Not bad | (2, 3, 4) |
Good | (4, 5, 6) |
Very good | (6, 7, 8) |
Perfect | (9, 9, 9) |
Weak advantage | (1, 2, 3) |
Preferable | (3, 4, 5) |
Fairly good | (5, 6, 7) |
Absolute | (7, 8, 9) |
Table 2. Fuzzy AHP aggregated pair wise matrix.
P1 | P2 | P3 | P4 | P5 | P6 | P7 | P8 | |
---|---|---|---|---|---|---|---|---|
1, 1, 1 | 0.9, 1.1, 1.4 | 1.2, 1.5, 1.7 | 0.9, 1, 1.1 | 2.1, 2.9, 3.8 | 1.1, 1.3, 1.6 | 2.1, 2.9, 3.8 | 0.9, 1.1, 1.4 | |
0.7, 0.9, 1.1 | 1, 1, 1 | 1.1, 1.6, 1.9 | 1.8, 1.9, 2.1 | 2.7, 3.4, 4 | 2.1, 2.7, 3.2 | 2.7, 3.4, 4 | 1, 1, 1 | |
0.6, 0.7, 0.8 | 0.5, 0.6, 0.9 | 1, 1, 1 | 1.4, 1.6, 1.9 | 1.7, 2.2, 2.9 | 1.7, 2.1, 2.6 | 1.7, 2.2, 2.9 | 0.5, 0.6, 0.9 | |
0.9, 1, 1.2 | 0.5, 0.55, 0.6 | 0.5, 0.6, 0.7 | 1, 1, 1 | 1.9, 2.5, 2.7 | 1.6, 2.5, 2.6 | 1.9, 2.5, 2.7 | 0.5, 0.55, 0.6 | |
0.3, 0.3, 0.5 | 0.3, 0.35, 0.4 | 0.3, 0.5, 0.7 | 0.3, 0.4, 0.5 | 1, 1, 1 | 1, 1.1, 1.3 | 1, 1, 1 | 0.3, 0.35, 0.4 | |
0.7, 0.8, 1 | 0.3, 0.4, 0.5 | 0.4, 0.5, 0.6 | 0.4, 0.5, 0.6 | 0.8, 0.9, 1.1 | 1, 1, 1 | 0.8, 0.9, 1.1 | 0.3, 0.4, 0.5 | |
2.1, 2.9, 3.8 | 2.7, 3.4, 4 | 1.7, 2.2, 2.9 | 1.9, 2.5, 2.7 | 1, 1, 1 | 0.8, 0.9, 1.1 | 1, 1, 1 | 2.7, 3.4, 4 | |
0.9, 1.1, 1.4 | 1, 1, 1 | 0.5, 0.6, 0.9 | 0.5, 0.55, 0.6 | 0.5, 0.55, 0.6 | 0.3, 0.35, 0.4 | 0.3, 0.4, 0.5 | 1, 1, 1 |
Table 3. Weights of factors.
Factors | Weights | BNP | Rank |
---|---|---|---|
0.15, 0.18, 0.21 | 0.16 | 2 | |
0.19, 0.2, 0.22 | 0.19 | 1 | |
0.13, 0.16, 0.19 | 0.15 | 4 | |
0.12, 0.15, 0.18 | 0.16 | 3 | |
0.06, 0.08, 0.1 | 0.07 | 8 | |
0.07, 0.09, 0.13 | 0.09 | 6 | |
0.08, 0.1, 0.13 | 0.1 | 5 | |
0.05, 0.08, 0.12 | 0.08 | 7 |
Table 4. Subjective cognition results.
Factors/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
5, 7, 8.9 | 4.4, 6.4, 8.4 | 4.4, 6.4, 8.3 | 2.6, 4.6, 6.6 | 4.4, 6.4, 8.4 | 4.4, 6.4, 8.3 | 2.6, 4.6, 6.6 | 4.4, 6.4, 8.4 | 4.4, 6.4, 8.3 | 2.6, 4.6, 6.6 | |
5.2, 7.2, 9 | 4.6, 6.6, 8.6 | 3.8, 5.8, 7.7 | 2.6, 4.6, 6.6 | 4.6, 6.6, 8.6 | 3.8, 5.8, 7.7 | 2.6, 4.6, 6.6 | 4.6, 6.6, 8.6 | 3.8, 5.8, 7.7 | 2.6, 4.6, 6.6 | |
4.6, 6.6, 8.6 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | |
5.6, 7.6, 9.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | |
4.8, 6.8, 8.7 | 4, 6, 8 | 3.8, 5.8, 7.8 | 2.6, 4.6, 6.6 | 4, 6, 8 | 3.8, 5.8, 7.8 | 2.6, 4.6, 6.6 | 4, 6, 8 | 3.8, 5.8, 7.8 | 2.6, 4.6, 6.6 | |
5, 7, 9 | 4.4, 6.4, 8.4 | 4.2, 6.2, 8.1 | 2.5, 4.4, 6.4 | 4.4, 6.6, 8.4 | 4.2, 6.2, 8.1 | 2.5, 4.4, 6.4 | 4.4, 6.6, 8.4 | 4.2, 6.2, 8.1 | 2.5, 4.4, 6.4 | |
4.6, 6.6, 8.6 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | |
5.6, 7.6, 9.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 |
Table 5. Normalized fuzzy-decision matrix.
Factors/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
0.54, 0.76, 0.97 | 0.48, 0.7, 0.9 | 0.48, 0.7, 0.9 | 0.28, 0.50, 0.72 | 0.48, 0.7, 0.9 | 0.48, 0.7, 0.9 | 0.28, 0.50, 0.72 | 0.48, 0.7, 0.9 | 0.48, 0.7, 0.9 | 0.28, 0.50, 0.72 | |
0.57, 0.78, 0.98 | 0.5, 0.72, 0.94 | 0.41, 0.63, 0.84 | 0.28, 0.50, 0.72 | 0.5, 0.72, 0.94 | 0.41, 0.63, 0.84 | 0.28, 0.50, 0.72 | 0.5, 0.72, 0.94 | 0.41, 0.63, 0.84 | 0.28, 0.50, 0.72 | |
0.5, 0.72, 0.94 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | |
0.61, 0.83, 1 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | |
0.52, 0.74, 0.95 | 0.44, 0.65, 0.86 | 0.41, 0.63, 0.85 | 0.28, 0.50, 0.72 | 0.44, 0.65, 0.86 | 0.41, 0.63, 0.85 | 0.28, 0.50, 0.72 | 0.44, 0.65, 0.86 | 0.41, 0.63, 0.85 | 0.28, 0.50, 0.72 | |
0.54, 0.76, 0.98 | 0.48, 0.7, 0.9 | 0.46, 0.67, 0.88 | 0.27, 0.48, 0.7 | 0.48, 0.7, 0.9 | 0.46, 0.67, 0.88 | 0.27, 0.48, 0.7 | 0.48, 0.7, 0.9 | 0.46, 0.67, 0.88 | 0.27, 0.48, 0.7 | |
0.5, 0.72, 0.94 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | |
0.61, 0.83, 1 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 |
Table 6. Weighted normalized fuzzy-decision matrix.
Factors/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
0.08, 0.16, 0.28 | 0.07, 0.15, 0.26 | 0.07, 0.15, 0.26 | 0.04, 0.10, 0.21 | 0.07, 0.15, 0.26 | 0.07, 0.15, 0.26 | 0.04, 0.10, 0.21 | 0.07, 0.15, 0.26 | 0.07, 0.15, 0.26 | 0.04, 0.10, 0.21 | |
0.11, 0.20, 0.35 | 0.09, 0.19, 0.34 | 0.08, 0.16, 0.30 | 0.05, 0.13, 0.26 | 0.09, 0.19, 0.34 | 0.08, 0.16, 0.30 | 0.05, 0.13, 0.26 | 0.09, 0.19, 0.34 | 0.08, 0.16, 0.30 | 0.05, 0.13, 0.26 | |
0.07, 0.13, 0.25 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | |
0.08, 0.14, 0.23 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | |
0.03, 0.06, 0.11 | 0.03, 0.05, 0.10 | 0.02, 0.05, 0.10 | 0.02, 0.04, 0.09 | 0.03, 0.05, 0.10 | 0.02, 0.05, 0.10 | 0.02, 0.04, 0.09 | 0.03, 0.05, 0.10 | 0.02, 0.05, 0.10 | 0.02, 0.04, 0.09 | |
0.04, 0.07, 0.13 | 0.03, 0.07, 0.12 | 0.03, 0.06, 0.12 | 0.02, 0.05, 0.09 | 0.03, 0.07, 0.12 | 0.03, 0.06, 0.12 | 0.02, 0.05, 0.09 | 0.03, 0.07, 0.12 | 0.03, 0.06, 0.12 | 0.02, 0.05, 0.09 | |
0.07, 0.13, 0.25 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | |
0.08, 0.14, 0.23 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 |
Table 7. Closeness coefficients to aspired level among different alternatives.
dbi | di | Gaps degree of | Satisfaction degree of | |
---|---|---|---|---|
0.24 | 0.49 | 0.67 | 0.33 | |
0.82 | 0.9 | 0.78 | 0.22 | |
0.27 | 0.51 | 0.65 | 0.35 | |
0.32 | 0.48 | 0.6 | 0.4 | |
0.42 | 0.61 | 0.59 | 0.41 | |
0.27 | 0.3 | 0.52 | 0.48 | |
0.3 | 0.42 | 0.58 | 0.42 | |
0.42 | 0.53 | 0.55 | 0.45 | |
0.29 | 0.42 | 0.59 | 0.41 | |
0.3 | 0.58 | 0.65 | 0.35 |
Table 8. The result of the usual/classical method and F-AHP and F-TOPSIS method.
Methods/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
0.331200 | 0.222400 | 0.352500 | 0.405500 | 0.414700 | 0.484900 | 0.425600 | 0.455100 | 0.416100 | 0.358900 | |
0.325600 | 0.222500 | 0.356100 | 0.405800 | 0.415600 | 0.485800 | 0.429800 | 0.466000 | 0.408900 | 0.347800 |
Table 9. Sensitivity analysis.
Original weights | 0.3312 | 0.2224 | 0.3525 | 0.4055 | 0.4147 | 0.4849 | 0.4256 | 0.4551 | 0.4161 | 0.3589 | ||
P1 | 0.3523 | 0.2375 | 0.3671 | 0.4213 | 0.4206 | 0.4963 | 0.43179 | 0.471 | 0.4294 | 0.36979 | ||
P2 | 0.33 | 0.2275 | 0.3541 | 0.4098 | 0.4111 | 0.4958 | 0.4268 | 0.4615 | 0.4289 | 0.3648 | ||
P3 | 0.3336 | 0.222 | 0.3611 | 0.4038 | 0.4066 | 0.4943 | 0.4238 | 0.457 | 0.4274 | 0.3618 | ||
P4 | 0.3426 | 0.0445 | 0.3485 | 0.3939 | 0.4158 | 0.4853 | 0.4271 | 0.4662 | 0.4184 | 0.3651 | ||
P5 | 0.3038 | 0.1899 | 0.3153 | 0.3786 | 0.3742 | 0.4565 | 0.3921 | 0.4246 | 0.3896 | 0.3301 | ||
P6 | 0.2565 | 0.1409 | 0.2705 | 0.3353 | 0.3278 | 0.4128 | 0.4048 | 0.3782 | 0.3459 | 0.3428 | ||
P7 | 0.3483 | 0.2278 | 0.3603 | 0.4282 | 0.416 | 0.5015 | 0.4348 | 0.4664 | 0.4346 | 0.3728 | ||
P8 | 0.3329 | 0.2395 | 0.3581 | 0.4138 | 0.4229 | 0.4864 | 0.4288 | 0.4733 | 0.4195 | 0.3668 |
International Journal of Fuzzy Logic and Intelligent Systems 2023; 23(3): 336-352
Published online September 25, 2023 https://doi.org/10.5391/IJFIS.2023.23.3.336
Copyright © The Korean Institute of Intelligent Systems.
Sultan H. Almotiri1 , Mohd Nadeem2 , Mohammed A. Al Ghamdi1 , and Raees Ahmad Khan3
1Department of Computer Science, Umm Al-Qura University, Makkah City, Saudi Arabia
2School of Computer Application, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India
3Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
Correspondence to:Mohd Nadeem (mohd.nadeem1155@gmail.com)
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.
Keywords: Quantum computing, Quantum software security, Healthcare software security, Fuzzy AHP, Fuzzy TOPSIS
The American law firm BakerHostetler released a report called “Information Security Occurrence Response Report” in 2022. It mentions that both the number and severity of security incidents are on the rise [1]. After analyzing more than 1,270 events, BakerHostetler discovered that 24% of safety incidents were caused by phishing, and 56% of them were caused by network outages. The remaining 20% of assaults were attributed to accidental disclosure, system errors, and stolen/misplaced data or equipment. Thirty-seven percent of the analyzed occurrences involved ransomware, an increase of 10% over the previous year. This has a wide range of effects, including new and higher expectations for younger medical professionals, new and higher standards for patient convenience and simplicity of participation with their healthcare organization, and the protection of their data. Another important consequence of this new world is the importance of healthcare data security.
According to the Software Advice’s 2022 Healthcare Data Security Survey, 36% of the healthcare companies in the United States have experienced a data breach (Figure 1). In addition, phishing was widespread. Phishing attacks were the primary cause of break-notice obligations, increasing from 43% in 2020 to 60% in 2021 [2–4]. According to many high-profile production network attacks involving outsiders in 2020, the research also noted that merchant-caused incidents were on the rise. The average number of days required to spot an attack was 47 days, which was significantly lower than the 2020 average (92 days). This was partially attributable to the acceptance of more advanced security tools. Overall, it required zero days, down from three days in 2019, and was identical to that of the previous year. The interval between the control and measurable examinations was also shortened; in 2021, it was 30 days, as opposed to 36 days in 2020. At that moment, more than 18,000 solar wind customers had installed the Sunburst update, allowing the remote access Trojans to infect all their client companies and frameworks. The US state, banking, and health departments were among the notable casualties of this attack [5].
Additionally, reports have shown that this malware affects privately held companies, such as FireEye, Intel, Cisco, and Microsoft. As acknowledged by Microsoft, it was difficult to estimate the number of afflicted associations and organizations because of the update’s ability to spread to numerous client devices. Currently, there is no clear indication as to who was responsible for the assault. State-approved programmers in Russia and China have drawn criticism, but the lack of thorough verification encourages further investigation. Software security includes procedures in security architecture to aid maintenance. This indicates that a piece of software is subjected to software security testing before being put on the market to determine its resistance to harmful assaults. Software security aims to build secure software from the ground up without the need for extra security layers. The next stage involves providing users with instructions on how to use the software correctly to fend off attacks. Software security is essential because malware attacks can compromise the availability, validity, and integrity of any software. If programmers consider this earlier rather than later in the development process, the damage can be stopped before it starts [6].
Network security refers to the security between devices connected to the same network. Security of both hardware and software is essential in this situation. To secure a network, businesses search for measures to prevent harmful usage [7]. The devices used in this scenario are the subject of endpoint security. Computers, cell phones, tablets, and other devices are secure in terms of both software and hardware to keep out unauthorized users. User control, software security, and other encryption techniques are widely used for this [8]. Cybersecurity, usually referred to as internet security, is concerned with the usage and transfer of information. Several layers of encryption and authentication are often employed to prevent cybersecurity attacks because information is intercepted during them [9]. It is necessary to protect data flows and devices connected to the same network [10].
The main goal of this study is based on the quantum algorithm as an alternative for evaluating healthcare software security (HSS). The evaluations assessed the security factors of software in the healthcare domain. Software security is necessary for the evolution of quantum computers. A team of researchers (Google and IBM) developed a quantum processor that can easily break the present security mechanisms [9, 11]. The estimation is required for the upgrade mechanism of the software.
Section 2 points out the researcher’s contribution in the area of HSS individually; Section 3 elaborates on the HSS factors and quantum algorithm that may be used for security purposes; Section 4 explains the estimation approach of soft computing, i.e., fuzzy analytic hierarchy process (F-AHP) and fuzzy techniques for order of preference by similarity to an ideal solution (F-TOPSIS); Section 5 compares the evaluation procedure with the classical one; and Section 6 determines the sensitivity analysis of the estimation of HSS. Finally, Section 7 explains the outcomes of the analysis and details the application of the evaluation concerning the future aspects of the results.
In healthcare software (HS) development, security is an essential part of IT-based organizations. The healthcare sector has witnessed significant advancements over the last decade. The evolution of artificial intelligence keeps the healthcare sector more vulnerable. After the development of quantum computers, software security has been at risk in the classical phase. Detailed studies on software security are discussed in this section of the literature review.
Bhavin et al. [12] mentioned that the healthcare sector has the right to know how and why data are being used under the general data protection rule. However, because the Internet is an open channel through which healthcare data move, it is possible for bad things to happen, such as sensitive data being stolen or stored data being changed. Privacy and security are challenging to preserve in traditional healthcare systems. The quantum computing (QC) examines several security architectures for protecting electronic health records and a common encryption scheme based on these facts. Quantum-enabled security algorithms protect data against quantum attacks on the traditional encryption method.
Sanavio et al. [13] stated that QC can perform tasks that were previously unimaginable because it uses quantum bits and the quantum properties of subatomic particles, such as superposition, entanglement, and interference, as well as other fundamentally different ways to process information than traditional computing systems. QC systems promise much faster processing; however, research and development are still in the early stages. QC has not been studied much in important fields such as healthcare, even though it could lead to important advances like faster DNA sequencing, drug development, and other processes that require considerable computing power. In this study, we look at how QC could be used in healthcare systems. QC has the potential to change the way healthcare systems work by making it possible to do complicated calculations faster [14] and identify security weaknesses of traditional cryptography systems. We examine the difficulties hindering the use of QC systems in healthcare and the causes that have contributed to them.
Davids et al. [15] mentioned conceptual extensions of many body systems and quantum computations that have yet to realize their full potential, including quantum clinical medicine and quantum surgery, and discussed QC principles. Advances in precise nanoengineering and new mathematical formalisms for algorithmic design, including quantum mechanics, category theory, quantum algebraic geometry, and others, are laying the groundwork for this intriguing area of medical and future surgical science. The authors predicted that QC would lead to improvements in healthcare, surgery, and medicine.
Malviya and Sundram [16] mentioned that the healthcare sector provides assistance to people fighting against illnesses and disorders. Medical practitioners provide state-of-the-art therapies and drugs to manage illness-related side effects. Patients want a modern, tailored healthcare system that can keep pace with their fast-paced lives. A QC system is a solution to the need for low latency and low energy consumption in real-time health data collection and analysis. QC is a cutting-edge computing technology based on the interesting phenomena of quantum physics and quantum mechanics. In this instance, physics, mathematics, information theory, and computer science are well integrated. It is feasible to attain speeds exponentially faster than those of conventional computers, have a larger processing capacity, consume less energy, and more by changing the behavior of microscopic particles like atoms, electrons, photons, and so on.
QC is growing rapidly, not only because its hardware is faster and can run complicated algorithms more quickly but also because it has a new tool for analyzing data that can solve problems with standard machine learning [17]. It uses ideas from quantum mechanics, such as superposition and entanglement, which have long been used in physics to perform computing tasks that are faster and possibly more complex than those that can be performed with traditional algorithms.
Clinical care and medical research were the first places where computers were used in a new manner. QC has the potential to make computers more powerful and initiate a new era in computer technology. A new era of computing has begun. The potential of QC in enhancing population health, imaging, diagnosis, and treatment is currently based solely on experiments. The use of quantum computers in routine medical and scientific applications has yet to be realized. Many machine learning and artificial intelligence algorithms have the potential to leverage QC to produce findings instantly. Researchers will continue to be the only ones who can use QC until it reaches this level of accessibility [18].
Perumal and Nadar [19] showed and explained that healthcare systems are inherently heterogeneous because each device has a different operating system, platform, and architecture. This variability affects communication latency and security issues. An optimized quantum approach is used to manage keys with the least overhead and decrease threats while simultaneously enhancing healthcare information security. The quantum channel was also used to simulate communication with the key authority. A dedicated quantum channel is used to distribute the generated key, which further improves security by lowering leakage, transmission errors, and eavesdropping. The healthcare user group and the content server communicate with the key server via a quantum channel that sends photons. Numerical data support key generation, optimization, and quantum distribution strategies. To encrypt and decrypt healthcare content, the security of patient data is improved, and quantum simulation estimates in healthcare networks decreased by 90% [19]. In the online healthcare world, the process of sending information between the main and each branch has always been important. In recent years, security checks for network technologies have become increasingly common. A secure and high-capacity information transfer protocol for healthcare cyber services is being developed using quantum algorithms and quantum expansion technology. This innovative technique simultaneously embeds the secret data in three layers and encrypts it. Finally, a quantum channel was used to send extremely secure secret information in the form of a quantum state. This new protocol provides a revolutionary steganography method for quantum images. In essence, the fact that the steganography protocol cannot be observed means that it has a higher level of security that may stop several attacks and make the process of sending information safer [20, 21].
Developers choose QC algorithms that enable security for future advancements in computing [11]. QA1–QA10 are alternatives for estimating HSS. The details of QA are discussed below:
In
The innovative
Multicriteria decision analyses are based on a hierarchy of factors and their dependence on alternatives. Quantitative analyses of the HSS estimation evaluate the weights and ranks of the factors and alternatives. The artificial approaches of the fuzzified AHP estimate the weights of the factors associated with the HSS, as shown in Figure 2. The artificial approach of the fuzzy TOPSIS evaluates the ranks of the associated alternatives.
We used the hybrid neural approach of F-AHP and F-TOPSIS as soft computing tools for making decisions based on multiple criteria. The FAHP looks at the importance of each factor, while the F-TOPSIS looks at the importance of each alternative [6]. This strategy assesses the variables that affect the perspective of the HSS. The initial weighted values are based on a thorough assessment of the literature. We chose to fulfill our goals using a multi-model dynamic regular technique to assess the aspects associated with HSS. The F-AHP and F-TOPSIS hybrid approaches were used to assess and survey the component weights. F-TOPSIS provides the precise position of the variable relative to the other alternatives. The going with theory fuzzy system was used to accurately assess the items. We chose a soft-computing method to evaluate these factors quantitatively. One of the elements of the F-AHP and F-TOPSIS approaches is item evaluation. To improve the comprehension of the problems and the accuracy of the resources, numerous methodologies and assessment frameworks have been published in hard copies. However, F-AHP is the most effective multi-rule method for calculating the effect of an item’s health. However, F-AHP encounters certain difficulties [24]. To manage crossbreed F-AHP and F-TOPSIS, we merged the F-TOPSIS with a creative management strategy [39]. This unique approach makes it easier to assess the impact factor and its alternatives accurately.
These techniques determine the unmistakable productive assurance of problems involving influencing HSS using the F-AHP method.
It depends on the attributes and number of options that are most closely related to those attributes. The fuzzy numbers used to compare the F-AHP show how they are evaluated and ranked philologically [9]. Table 1 displays the corresponding fuzzy numbers for the comparison of the philological rankings. Figure 3 shows a fuzzy comparison measures (FCM) representation.
Subsequently, the F-AHP system assessed each substance submitted by the examiner. Subsequent improvements selected FCM from the hierarchical architecture. One metric assesses how a component and its selection affect various elective principles. Each variable had a pairwise relationship that acknowledged its importance to the whole (Figure 4). The following iteration of the F-AHP modifies the numerical value of the etymological phrases using fuzzy correlation measurements [23]. The heaviness of the pieces was determined using the FAHP technique. These approaches are described in detail as follows:
As illustrated in Figure 4, choose or consider “
where
The m alternative in geometrical arrangement with m points and n-dimensional area The TOPSIS methodology is used in multi-criteria decision selection for ranking. The core of the TOPSIS approach is the notion of the enduring and most remote distance from the positive ideal solution and the negative ideal solution for the most favorable and minimal ideal solution, respectively [40]. The TOPSIS approach significantly simplifies the process of assigning the appropriate position to the alternative and the factor concerning the criterion. To create uniformity in a fuzzy environment and indicate the importance of the criteria, TOPSIS assigns fuzzy numbers based on preference.
• Create a fuzzy decision matrix.
• Normalize the fuzzy decision matrix.
• Create a quantified fuzzy normalized decision matrix.
• Evaluate and define FPIS, FNIS.
• Evaluate the closeness coefficient.
The fuzzy decision matrix is created using
Here,
Calculate the normalization of the fuzzy decision matrix using
The intended highest level
where
The components
By assessing and defining fuzzy positive ideal solution (FPIS) and fuzzy negative ideal solution (FNIS), the FPIS A+ (aspiration levels) and the FNIS A are shown in
Applying the area compensation approach, as shown in
The degree of relative gaps is represented by the closeness coefficient (
Here,
– is defined as the fuzzy gap degree in the
F-AHP is a hybrid soft-computing method that combines F-AHP and F-TOPSIS. This gives the weight of each influencing factor from P1 to P8. From QA1 to QA10, the F-TOPSIS technique ranked the choices. The majority of the time, subjective assessment is adequate for determining how the HSS factors will affect things. It is challenging to quantitatively evaluate HSS. Although a property of order at one level affects one or more qualities at a more significant level, the effects are not the same, as shown in Figure 4. Things might vary. To evaluate this, we converted the aggregated qualities into chains of importance.
Table 2 lists the different security risks P1 to P8, and their FCM weights and BNP are listed in Table 3
Tables 5
The F-TOPSIS equation in Table 8 indicates the degree of closeness. The various HSS properties were comparable. According to expert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition pert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition. Figure 5 shows the degree of proximity.
The same data, results, and output differ when different methodologies are applied. This guaranteed the effectiveness and dependability of the method [22]. In this study, we evaluated the efficacy and precision of the outcome using the F-AHPTOPSIS approach. AHP-TOPSIS uses the same data collection and estimation techniques as fuzzy AHP-TOPSIS; however, no fuzzifications are applied [39]. As a result, for the classic AHP-TOPSIS, the values are taken in their real number form. The distinction between the conventional and fuzzy AHP-TOPSIS results is presented in Table 8 and Figure 6. The results of the F-AHPTOPSIS method and those from the traditional AHPTOPSIS approach had a Pearson correlation coefficient of 0.999176. The F-AHP and F-TOPSIS procedures and methods were superior to the second technique in terms of effectiveness.
Using the sensitivity analyses [41, 42] shown in Table 9, the results were checked as each variable was changed. Sensitivity analysis was performed based on the variables’ weights [43]. Several experiments for each factor with the same number of participants were conducted in our HSS-based investigation to confirm the sensitivity analyses [44, 45]. The satisfaction level (CC-i) was computed using the F-AHPTOSIS method by calculating the weight of each factor (P1–P8 as a constant). The results of the sensitivity analyses are presented in Table 9. The first rows of Table 9 and Figure 7 display the initial weights, whereas Figure 6 displays the first collection of data. According to the initial weights and outcomes, Factor-8 (P1–P8) had a high level of satisfaction (CC-i). Ten experiments were conducted, from QA1 to QA10. The findings of eight studies showed that Factor-8 (P1–P8) still had a high degree of pleasure (CC-i). P2 was also a factor in each experiment and was assigned the least weight. The different correlations between the data show that alternative ratings are weight dependent [46, 47].
Software is becoming increasingly complicated and important in everyday life. However, the main reason why there are so many more data breaches is that there is insufficient security infrastructure that is easy to use. Dominion National, an insurance company, found a nine-year attack on its servers that could have put the personal information of 2.96 million patients at risk. These infractions have led to the theft or exposure of more than 189 million healthcare documents. Therefore, there is an urgent need to evaluate the security of software products using high-quality methods built in. The goal of this investigation was to calculate HSS. To this end, a case study was conducted on six hospital management software companies. To fulfill its goals, this study used ten alternatives in addition to eight security attributes at level I, namely QA1 to QA10, which include QA1, QA2, QA3, QA4, QA5, QA6, QA7, QA8, QA9, and QA10.
The results of this empirical investigation will help experts create software with the correct level of security. Several security models each estimate security in various ways. Nevertheless, few security model options are available for a single product. Furthermore, only a small percentage employ TOPSIS, F-AHP, or other multi-criteria decision-making techniques. The authors used the unified fuzzy AHP-TOPSIS of the MCDM. Fuzzy logic is particularly adept at resolving ambiguous and imprecise information in decision-making challenges; this property of the AHP properly portrays real-world problems and yields better solutions. In addition, TOPSIS supports the selection of the best option from the given options by effectively categorizing alternatives. To attain the best outcomes compared to other MCDM approaches, this study used the combined fuzzy AHP-TOPSIS. According to the findings of this study, the QA6 program provided the highest level of security and user satisfaction among the ten alternatives. The highlights of our study are listed below along with a summary of the results.
Pros: Secure HSS apps can assist programmers and designers in producing superior programs that can completely please users.
• With the help of the F-AHP-derived results of this study, practitioners can group qualities into groups and choose security design options when making software products.
• This will provide software products with long-lasting security.
• Security is a significant problem in the quantum world that is currently unaddressed. This study will serve as the gold standard for app developers to gain a thorough understanding of security architecture.
Changing validity:
• Finding and choosing attributes for security assessment is neither ideal nor definitive. The number of attributes or specific sets of qualities may have affected the results. Although MCDM techniques may be more suitable for MCDM issues, the combined fuzzy AHP-TOPSIS is a useful tool for security evaluations.
• In conclusion, this study employed an integrated fuzzy AHP-TOPSIS methodology to assess HSS security.
The powerful fuzzy AHP-TOPSIS Integrated method can be used to evaluate any MCDM problem with numerous parts and options, such as security assessments. Using a quantum computer, we calculated the security factors and estimated the HSS. The necessary weight variables were also assessed. The most recent evaluation of options using TOPSIS was tested for each of the open security options QA1–QA10 (QA6
Graphical representation of security issues in the healthcare sector (2020–2022).
Hierarchical structure of the factors and alternatives.
Radar representation of FCM.
Fuzzy comparison measures.
Degree of closeness IoMT.
Comparison of quantum algorithm as an alternative with the fuzzified and non-fuzzified approach.
Graphical representation of sensitivity analysis.
Table 1 . Fuzzy comparison measures (FCM).
Linguistic terms | FCM |
---|---|
Equal | (1, 1, 1) |
Not bad | (2, 3, 4) |
Good | (4, 5, 6) |
Very good | (6, 7, 8) |
Perfect | (9, 9, 9) |
Weak advantage | (1, 2, 3) |
Preferable | (3, 4, 5) |
Fairly good | (5, 6, 7) |
Absolute | (7, 8, 9) |
Table 2 . Fuzzy AHP aggregated pair wise matrix.
P1 | P2 | P3 | P4 | P5 | P6 | P7 | P8 | |
---|---|---|---|---|---|---|---|---|
1, 1, 1 | 0.9, 1.1, 1.4 | 1.2, 1.5, 1.7 | 0.9, 1, 1.1 | 2.1, 2.9, 3.8 | 1.1, 1.3, 1.6 | 2.1, 2.9, 3.8 | 0.9, 1.1, 1.4 | |
0.7, 0.9, 1.1 | 1, 1, 1 | 1.1, 1.6, 1.9 | 1.8, 1.9, 2.1 | 2.7, 3.4, 4 | 2.1, 2.7, 3.2 | 2.7, 3.4, 4 | 1, 1, 1 | |
0.6, 0.7, 0.8 | 0.5, 0.6, 0.9 | 1, 1, 1 | 1.4, 1.6, 1.9 | 1.7, 2.2, 2.9 | 1.7, 2.1, 2.6 | 1.7, 2.2, 2.9 | 0.5, 0.6, 0.9 | |
0.9, 1, 1.2 | 0.5, 0.55, 0.6 | 0.5, 0.6, 0.7 | 1, 1, 1 | 1.9, 2.5, 2.7 | 1.6, 2.5, 2.6 | 1.9, 2.5, 2.7 | 0.5, 0.55, 0.6 | |
0.3, 0.3, 0.5 | 0.3, 0.35, 0.4 | 0.3, 0.5, 0.7 | 0.3, 0.4, 0.5 | 1, 1, 1 | 1, 1.1, 1.3 | 1, 1, 1 | 0.3, 0.35, 0.4 | |
0.7, 0.8, 1 | 0.3, 0.4, 0.5 | 0.4, 0.5, 0.6 | 0.4, 0.5, 0.6 | 0.8, 0.9, 1.1 | 1, 1, 1 | 0.8, 0.9, 1.1 | 0.3, 0.4, 0.5 | |
2.1, 2.9, 3.8 | 2.7, 3.4, 4 | 1.7, 2.2, 2.9 | 1.9, 2.5, 2.7 | 1, 1, 1 | 0.8, 0.9, 1.1 | 1, 1, 1 | 2.7, 3.4, 4 | |
0.9, 1.1, 1.4 | 1, 1, 1 | 0.5, 0.6, 0.9 | 0.5, 0.55, 0.6 | 0.5, 0.55, 0.6 | 0.3, 0.35, 0.4 | 0.3, 0.4, 0.5 | 1, 1, 1 |
Table 3 . Weights of factors.
Factors | Weights | BNP | Rank |
---|---|---|---|
0.15, 0.18, 0.21 | 0.16 | 2 | |
0.19, 0.2, 0.22 | 0.19 | 1 | |
0.13, 0.16, 0.19 | 0.15 | 4 | |
0.12, 0.15, 0.18 | 0.16 | 3 | |
0.06, 0.08, 0.1 | 0.07 | 8 | |
0.07, 0.09, 0.13 | 0.09 | 6 | |
0.08, 0.1, 0.13 | 0.1 | 5 | |
0.05, 0.08, 0.12 | 0.08 | 7 |
Table 4 . Subjective cognition results.
Factors/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
5, 7, 8.9 | 4.4, 6.4, 8.4 | 4.4, 6.4, 8.3 | 2.6, 4.6, 6.6 | 4.4, 6.4, 8.4 | 4.4, 6.4, 8.3 | 2.6, 4.6, 6.6 | 4.4, 6.4, 8.4 | 4.4, 6.4, 8.3 | 2.6, 4.6, 6.6 | |
5.2, 7.2, 9 | 4.6, 6.6, 8.6 | 3.8, 5.8, 7.7 | 2.6, 4.6, 6.6 | 4.6, 6.6, 8.6 | 3.8, 5.8, 7.7 | 2.6, 4.6, 6.6 | 4.6, 6.6, 8.6 | 3.8, 5.8, 7.7 | 2.6, 4.6, 6.6 | |
4.6, 6.6, 8.6 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | |
5.6, 7.6, 9.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | |
4.8, 6.8, 8.7 | 4, 6, 8 | 3.8, 5.8, 7.8 | 2.6, 4.6, 6.6 | 4, 6, 8 | 3.8, 5.8, 7.8 | 2.6, 4.6, 6.6 | 4, 6, 8 | 3.8, 5.8, 7.8 | 2.6, 4.6, 6.6 | |
5, 7, 9 | 4.4, 6.4, 8.4 | 4.2, 6.2, 8.1 | 2.5, 4.4, 6.4 | 4.4, 6.6, 8.4 | 4.2, 6.2, 8.1 | 2.5, 4.4, 6.4 | 4.4, 6.6, 8.4 | 4.2, 6.2, 8.1 | 2.5, 4.4, 6.4 | |
4.6, 6.6, 8.6 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | 3.6, 5.6, 7.6 | 4, 6, 7.9 | 3, 5, 7 | |
5.6, 7.6, 9.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 | 4.8, 6.8, 8.7 | 4.6, 6.6, 8.4 | 3.2, 5.2, 7.2 |
Table 5 . Normalized fuzzy-decision matrix.
Factors/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
0.54, 0.76, 0.97 | 0.48, 0.7, 0.9 | 0.48, 0.7, 0.9 | 0.28, 0.50, 0.72 | 0.48, 0.7, 0.9 | 0.48, 0.7, 0.9 | 0.28, 0.50, 0.72 | 0.48, 0.7, 0.9 | 0.48, 0.7, 0.9 | 0.28, 0.50, 0.72 | |
0.57, 0.78, 0.98 | 0.5, 0.72, 0.94 | 0.41, 0.63, 0.84 | 0.28, 0.50, 0.72 | 0.5, 0.72, 0.94 | 0.41, 0.63, 0.84 | 0.28, 0.50, 0.72 | 0.5, 0.72, 0.94 | 0.41, 0.63, 0.84 | 0.28, 0.50, 0.72 | |
0.5, 0.72, 0.94 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | |
0.61, 0.83, 1 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | |
0.52, 0.74, 0.95 | 0.44, 0.65, 0.86 | 0.41, 0.63, 0.85 | 0.28, 0.50, 0.72 | 0.44, 0.65, 0.86 | 0.41, 0.63, 0.85 | 0.28, 0.50, 0.72 | 0.44, 0.65, 0.86 | 0.41, 0.63, 0.85 | 0.28, 0.50, 0.72 | |
0.54, 0.76, 0.98 | 0.48, 0.7, 0.9 | 0.46, 0.67, 0.88 | 0.27, 0.48, 0.7 | 0.48, 0.7, 0.9 | 0.46, 0.67, 0.88 | 0.27, 0.48, 0.7 | 0.48, 0.7, 0.9 | 0.46, 0.67, 0.88 | 0.27, 0.48, 0.7 | |
0.5, 0.72, 0.94 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | 0.39, 0.61, 0.83 | 0.44, 0.65, 0.86 | 0.33, 0.54, 0.76 | |
0.61, 0.83, 1 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 | 0.52, 0.74, 0.95 | 0.5, 0.72, 0.94 | 0.35, 0.57, 0.78 |
Table 6 . Weighted normalized fuzzy-decision matrix.
Factors/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
0.08, 0.16, 0.28 | 0.07, 0.15, 0.26 | 0.07, 0.15, 0.26 | 0.04, 0.10, 0.21 | 0.07, 0.15, 0.26 | 0.07, 0.15, 0.26 | 0.04, 0.10, 0.21 | 0.07, 0.15, 0.26 | 0.07, 0.15, 0.26 | 0.04, 0.10, 0.21 | |
0.11, 0.20, 0.35 | 0.09, 0.19, 0.34 | 0.08, 0.16, 0.30 | 0.05, 0.13, 0.26 | 0.09, 0.19, 0.34 | 0.08, 0.16, 0.30 | 0.05, 0.13, 0.26 | 0.09, 0.19, 0.34 | 0.08, 0.16, 0.30 | 0.05, 0.13, 0.26 | |
0.07, 0.13, 0.25 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | |
0.08, 0.14, 0.23 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | |
0.03, 0.06, 0.11 | 0.03, 0.05, 0.10 | 0.02, 0.05, 0.10 | 0.02, 0.04, 0.09 | 0.03, 0.05, 0.10 | 0.02, 0.05, 0.10 | 0.02, 0.04, 0.09 | 0.03, 0.05, 0.10 | 0.02, 0.05, 0.10 | 0.02, 0.04, 0.09 | |
0.04, 0.07, 0.13 | 0.03, 0.07, 0.12 | 0.03, 0.06, 0.12 | 0.02, 0.05, 0.09 | 0.03, 0.07, 0.12 | 0.03, 0.06, 0.12 | 0.02, 0.05, 0.09 | 0.03, 0.07, 0.12 | 0.03, 0.06, 0.12 | 0.02, 0.05, 0.09 | |
0.07, 0.13, 0.25 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | 0.05, 0.11, 0.22 | 0.06, 0.12, 0.23 | 0.04, 0.10, 0.21 | |
0.08, 0.14, 0.23 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 | 0.07, 0.13, 0.22 | 0.06, 0.12, 0.21 | 0.04, 0.10, 0.18 |
Table 7 . Closeness coefficients to aspired level among different alternatives.
dbi | di | Gaps degree of | Satisfaction degree of | |
---|---|---|---|---|
0.24 | 0.49 | 0.67 | 0.33 | |
0.82 | 0.9 | 0.78 | 0.22 | |
0.27 | 0.51 | 0.65 | 0.35 | |
0.32 | 0.48 | 0.6 | 0.4 | |
0.42 | 0.61 | 0.59 | 0.41 | |
0.27 | 0.3 | 0.52 | 0.48 | |
0.3 | 0.42 | 0.58 | 0.42 | |
0.42 | 0.53 | 0.55 | 0.45 | |
0.29 | 0.42 | 0.59 | 0.41 | |
0.3 | 0.58 | 0.65 | 0.35 |
Table 8 . The result of the usual/classical method and F-AHP and F-TOPSIS method.
Methods/Alternatives | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 |
---|---|---|---|---|---|---|---|---|---|---|
0.331200 | 0.222400 | 0.352500 | 0.405500 | 0.414700 | 0.484900 | 0.425600 | 0.455100 | 0.416100 | 0.358900 | |
0.325600 | 0.222500 | 0.356100 | 0.405800 | 0.415600 | 0.485800 | 0.429800 | 0.466000 | 0.408900 | 0.347800 |
Table 9 . Sensitivity analysis.
Original weights | 0.3312 | 0.2224 | 0.3525 | 0.4055 | 0.4147 | 0.4849 | 0.4256 | 0.4551 | 0.4161 | 0.3589 | ||
P1 | 0.3523 | 0.2375 | 0.3671 | 0.4213 | 0.4206 | 0.4963 | 0.43179 | 0.471 | 0.4294 | 0.36979 | ||
P2 | 0.33 | 0.2275 | 0.3541 | 0.4098 | 0.4111 | 0.4958 | 0.4268 | 0.4615 | 0.4289 | 0.3648 | ||
P3 | 0.3336 | 0.222 | 0.3611 | 0.4038 | 0.4066 | 0.4943 | 0.4238 | 0.457 | 0.4274 | 0.3618 | ||
P4 | 0.3426 | 0.0445 | 0.3485 | 0.3939 | 0.4158 | 0.4853 | 0.4271 | 0.4662 | 0.4184 | 0.3651 | ||
P5 | 0.3038 | 0.1899 | 0.3153 | 0.3786 | 0.3742 | 0.4565 | 0.3921 | 0.4246 | 0.3896 | 0.3301 | ||
P6 | 0.2565 | 0.1409 | 0.2705 | 0.3353 | 0.3278 | 0.4128 | 0.4048 | 0.3782 | 0.3459 | 0.3428 | ||
P7 | 0.3483 | 0.2278 | 0.3603 | 0.4282 | 0.416 | 0.5015 | 0.4348 | 0.4664 | 0.4346 | 0.3728 | ||
P8 | 0.3329 | 0.2395 | 0.3581 | 0.4138 | 0.4229 | 0.4864 | 0.4288 | 0.4733 | 0.4195 | 0.3668 |
Graphical representation of security issues in the healthcare sector (2020–2022).
|@|~(^,^)~|@|Hierarchical structure of the factors and alternatives.
|@|~(^,^)~|@|Radar representation of FCM.
|@|~(^,^)~|@|Fuzzy comparison measures.
|@|~(^,^)~|@|Degree of closeness IoMT.
|@|~(^,^)~|@|Comparison of quantum algorithm as an alternative with the fuzzified and non-fuzzified approach.
|@|~(^,^)~|@|Graphical representation of sensitivity analysis.